WMIPJOBJ.pdb
Static task
static1
Behavioral task
behavioral1
Sample
462c62bd135dbad191f646ee80feb882_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
462c62bd135dbad191f646ee80feb882_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
462c62bd135dbad191f646ee80feb882_JaffaCakes118
-
Size
233KB
-
MD5
462c62bd135dbad191f646ee80feb882
-
SHA1
bf8f3c4de4fc24e87dbf20e5039744fa2da296f1
-
SHA256
3c80fed7b6859b92e5cf8c03e4cfd8f6ca6bf8aedf6d9222f98f38a08c8b6226
-
SHA512
d87fa6642d8132e1ab6eb095b15ff531ce72d7179536f9b2404f9262283d7a8c9042b6dff42ca369d42af8c3fc62d9babec3ba1db944891bc5a89fea63081357
-
SSDEEP
6144:z6YdAmrVHBGXBYqHTwuX3AZAvJDAWTlB/ZMO00Skxb/Op:z6uMXB/zvvJDAElBeGHb/Op
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 462c62bd135dbad191f646ee80feb882_JaffaCakes118
Files
-
462c62bd135dbad191f646ee80feb882_JaffaCakes118.dll regsvr32 windows:5 windows x86 arch:x86
fb1d0577de4027ba93d06b842f5f760d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
wcsncpy
__CxxFrameHandler
towupper
_except_handler3
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_adjust_fdiv
_initterm
free
malloc
_ultow
_ui64tow
_wcslwr
_CxxThrowException
iswupper
_wcsicmp
wcscat
wcsrchr
wcschr
wcscpy
wcslen
_i64tow
framedyn
?ReleaseBuffer@CHString@@QAEXH@Z
?GetBuffer@CHString@@QAEPAGH@Z
?MakeLower@CHString@@QAEXXZ
??4CHString@@QAEABV0@PBG@Z
??1CHString@@QAE@XZ
??4CHString@@QAEABV0@ABV0@@Z
??0CObjectPathParser@@QAE@W4ObjectParserFlags@@@Z
?Parse@CObjectPathParser@@QAEHPBGPAPAUParsedObjectPath@@@Z
??0CFrameworkQueryEx@@QAE@XZ
?Init@CFrameworkQuery@@QAEJPAUParsedObjectPath@@PAUIWbemContext@@PBGAAVCHString@@@Z
?GetSize@CHStringArray@@QBEHXZ
??ACHStringArray@@QAEAAVCHString@@H@Z
??1CFrameworkQueryEx@@QAE@XZ
?Free@CObjectPathParser@@QAEXPAUParsedObjectPath@@@Z
??1CObjectPathParser@@QAE@XZ
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
??0CFrameworkQuery@@QAE@XZ
?Init@CFrameworkQuery@@QAEJQAG0JAAVCHString@@@Z
?GetValuesForProp@CFrameworkQuery@@QAEJPBGAAV?$vector@V_bstr_t@@V?$allocator@V_bstr_t@@@std@@@std@@@Z
??1CFrameworkQuery@@QAE@XZ
??0CHStringArray@@QAE@XZ
?Add@CHStringArray@@QAEHPBG@Z
??1CHStringArray@@QAE@XZ
??BCHString@@QBEPBGXZ
??0CHString@@QAE@XZ
?IsPropertyRequired@CFrameworkQuery@@QAE_NPBG@Z
ole32
CoGetCallContext
StringFromCLSID
CoTaskMemFree
oleaut32
SafeArrayCreate
SafeArrayPutElement
VariantCopy
SysFreeString
SysAllocString
VariantClear
VariantInit
kernel32
LocalFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleFileNameW
DisableThreadLibraryCalls
WaitForSingleObject
TerminateThread
OpenJobObjectW
QueryInformationJobObject
LoadLibraryW
GetProcAddress
FreeLibrary
InterlockedDecrement
InterlockedIncrement
GetVersionExW
GetCurrentThread
GetLastError
CloseHandle
user32
wsprintfW
advapi32
IsValidSid
LookupAccountSidW
OpenThreadToken
GetTokenInformation
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
RegDeleteKeyW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 173KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ